You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@apr.apache.org by co...@apache.org on 2023/01/23 18:20:04 UTC
svn commit: r1906955 - /apr/site/trunk/tools/release.sh
Author: covener
Date: Mon Jan 23 18:20:04 2023
New Revision: 1906955
URL: http://svn.apache.org/viewvc?rev=1906955&view=rev
Log:
copy paste
Modified:
apr/site/trunk/tools/release.sh
Modified: apr/site/trunk/tools/release.sh
URL: http://svn.apache.org/viewvc/apr/site/trunk/tools/release.sh?rev=1906955&r1=1906954&r2=1906955&view=diff
==============================================================================
--- apr/site/trunk/tools/release.sh (original)
+++ apr/site/trunk/tools/release.sh Mon Jan 23 18:20:04 2023
@@ -42,7 +42,7 @@
# # Process the CVEs that have been part of the release:
# 6. set CVEs to READY on the cveprocess site
# - Fill in a 'reference' tag 'vendor-advisory' with the URL to your public post about
-# this issue. A link to https://httpd.apache.org/security/vulnerabilities_24.html is sufficient.
+# this issue. A link to CHANGES doc updated above is sufficient.
# - Use the 'OSS/ASF Emails' tab for the emails you should send to oss-security
# and to Apache lists.
# - ASF Security will be notified and will submit to the CVE